Method for decoding a probabilistic anti-collusion code - The invention relates to a method for decoding a probabilistic anti-collusion code intended to identify at least one sequence of code present in a multimedia content having been used to create an illegal copy of this multimedia content, this method comprising a step of estimating the collusion strategy used to constitute the illegal copy associated with a step of identifying the sequences having been used in creating the illegal copy. The estimation of the collusion strategy used and the identification of sequences having been used to create the illegal copy are carried out sequentially and iteratively in order to refine the precision of each of these according to the following steps: Creating two parameters, a vector of probabilities of the presence of a sequence in the collusion and a vector of probabilities θ representing the collusion strategy; Initialising the iterative method by initialising one of the two parameters; Estimating the parameter vector of probabilities of the presence of a sequence in the collusion; Estimating the parameter vector of probabilities θ of the collusion strategy which maximises the probability of the collusion strategy; Iterating the steps c) and d) until a determined number of iterations or until convergence of the parameter vector of probabilities θ of the collusion strategy; Identifying at least one sequence of the code present in a multimedia content having been used to create the illegal copy.

SIDE CHANNEL ATTACK ANALYSIS - A method described herein includes acts of executing a cryptographic function over input data utilizing a processor on a computing device and generating a data packet that indicates how the cryptographic function interacts with hardware of the computing device, wherein the hardware of the computing device comprises the processor. The method also includes acts of analyzing the data packet, and generating an indication of security of the cryptographic function with respect to at least one side channel attack based at least in part upon the analyzing of the data packet.

09-22-2011

20110150211

Passive System for Recovering Cryptography Keys - Modern cellular wireless communications providers strive to keep their network and subscribers secure through various means. The identity of the subscriber may be obfuscated through the use of a temporary identifier for most network transactions including signaling events, voice calls, SMS messages and data sessions. A subscriber's unique identity may only be transmitted over the air in an encrypted form. Similarly, the content of voice calls, SMS messages and data sessions may also be encrypted when transmitted over the air and even when transferred over internal network interfaces. However, the use of encryption presents significant challenges for law enforcement communities when court ordered lawful intercept is required to monitor and locate subscribers utilizing the wireless networks for illegal and/or terrorist purposes. A technique to aid in the determination of a subscriber's unique wireless identity and the decryption of encrypted signals would be very useful for lawful intercept. In this document we describe an architecture and technique to aid in the decryption of encrypted wireless signals for lawful intercept by determining the current encryption key. It may also be used to decrypt encrypted signals on internal interfaces of the wireless and wireline networks.

06-23-2011

20100195819

Interval Centroid Based Watermark Decoder - An interval centroid-based watermark encoder encodes a watermark into a packet flow. Intervals are defined for the packet flow. Some of the intervals are selected as group A intervals while other intervals are selected as group B intervals. Group A and group B intervals are paired and assigned to watermark bits. A first or second value may be encoded by increasing the relative packet time between packets in either the group A (for the first bit value) or group B (for the second bit value) interval(s) of the interval pair(s) assigned to the watermark bits that are to represent the first or second bit value and the beginning of the same group interval(s). The relative packet times may be measured by a decoder and used to calculate a centroid difference for each interval pair. The centroid differences may be used to reconstruct the watermark.

08-05-2010

20110069832

WIRELESS NETWORK PROBE SYSTEM AND METHOD - A wireless network probe method intercepts a data packet sent from a certain station, which has established communication with an access point (AP) connected to a wireless network before a service set identifier (SSID) of the wireless network has been closed. The method further amends data in the data packet to generate two attacked data packets, transmits the two attacked data packets using a media control access (MAC) address of the certain station, to interrupt the communication between the AP and the certain station. Furthermore, the method intercepts a re-association data packet sent to the AP from the certain station, retrieves the SSID from the re-association data packet, and stores the SSID into a second station, so as to connect the second station to the wireless network.

03-24-2011

20110044449

PASSWORD DECIPHERING APPARATUS AND METHOD - Provided are an apparatus and a method for deciphering a password. The password deciphering apparatus includes a host control unit and at least two graphic processing units. The host control unit generates candidate passwords for detection of a password of a ciphered document file, and allocates the generated candidate passwords to at least two graphic processing units in a non-overlapping manner. The graphic processing units output password detection information when detecting the password of the document file by searching the allocated candidate passwords. Herein, upon receiving the password detection information from one of the graphic processing units, the host control unit uses the password detection information to detect the password.

02-24-2011

20110135087

PASSWORD SEARCHING METHOD AND SYSTEM IN MULTI-NODE PARALLEL-PROCESSING ENVIRONMENT - Provided are a method and a system for decrypting a password in multi-node parallel-processing environment including a master node and a plurality of work nodes. The master node receives information on encrypted file selection from a user. The master node generates password candidate information generation information and transmits the password candidate to the plurality of work nodes together with a password decryption command. The password candidate generation information allows the plurality of work nodes to have different password candidate ranges using password decryption information comprising a maximum password length, a minimum password length, and a string set constituting the password. The work node decrypts the password using the password candidate generation information. The work node transmits the password decryption result to the master node.

06-09-2011

20100246808

SIDE CHANNEL ATTACK TOLERANCE EVALUATION APPARATUS, METHOD AND PROGRAM - Provided is a side channel attack tolerance evaluation device capable of evaluating the propriety of the estimation of an encryption algorism, processing timing, and determination of a processing sequence of the encryption algorism using side channel information. The side channel attack tolerance evaluation device, which performs evaluation of tolerance to a side channel attack by using side channel information leaking from an encryption device, is provided with a storage unit (character data storage device), a measurement unit (side channel information measurement device), and a processing unit (side channel attack tolerance evaluation unit). The storage unit stores side channel information that has been previously acquired by executing a predetermined encryption algorithm in an encryption device or information obtained by applying predetermined processing to the side channel information. The measurement unit measures the side channel information generated from an encryption device to be evaluated. The processing unit calculates a correlation value between the side channel information acquired by the measurement unit and character data stored in the storage unit to determine the propriety of tolerance of the encryption device to be evaluated to the side channel attack.